Exploiting Vulnerable Pandas
There’s been some debate recently (see the work of Tavis Ormandy, Project ...
WAP just happened to my Samsung Galaxy?
This is the third in a series of blogs about how, even in 2017, SMS-based attack...
Mobile Malware State of Play
For a while we've been suggesting to our colleagues that mobile malware is n...
Securing Corporate Mobile Devices
Mobile computing is well and truly ubiquitous, and has transformed the business ...
Targeting Android for OTA Exploitation
‘If you know the enemy and know yourself, you need not fear the result of ...